Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC

Recently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message authentication code (MAC) scheme for the random linear network coding (RLNC) to resist tag pollution attacks (TPAs), and also presented the security analysis. As Esfahani et al. said, their scheme is based on the null space pro...

Full description

Bibliographic Details
Main Authors: Jinyong Chang, Bilin Shao, Anling Zhang, Genqing Bian, Yanyan Ji, Maozhi Xu
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8753646/
_version_ 1819174437019189248
author Jinyong Chang
Bilin Shao
Anling Zhang
Genqing Bian
Yanyan Ji
Maozhi Xu
author_facet Jinyong Chang
Bilin Shao
Anling Zhang
Genqing Bian
Yanyan Ji
Maozhi Xu
author_sort Jinyong Chang
collection DOAJ
description Recently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message authentication code (MAC) scheme for the random linear network coding (RLNC) to resist tag pollution attacks (TPAs), and also presented the security analysis. As Esfahani et al. said, their scheme is based on the null space properties of Kehdi and Li, and the main contribution lies in adding the process of swapping when generating the tags for data packets. However, in this paper, we first point out that Esfahani et al.'s swapping technique is not essential for the TPA security, because the underlying non-swapping homomorphic MAC scheme has been secure against TPA and the process of swapping only improves the TPA security with a non-negligible factor. More importantly, we find that the security proof of Esfahani et al. is incorrect and misguided. In particular, according to Esfahani et al. suggestion, one should enlarge the number of neighbor nodes to reduce the probability of the TPA. However, this paper gives contrary suggestions in Esfahani et al.'s work by presenting the precise proof for the proposed homomorphic MAC scheme.
first_indexed 2024-12-22T20:38:57Z
format Article
id doaj.art-7107b31f66554689be9fb162229d8469
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-22T20:38:57Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-7107b31f66554689be9fb162229d84692022-12-21T18:13:23ZengIEEEIEEE Access2169-35362019-01-017883938839810.1109/ACCESS.2019.29264018753646Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNCJinyong Chang0https://orcid.org/0000-0002-6569-5152Bilin Shao1Anling Zhang2Genqing Bian3Yanyan Ji4Maozhi Xu5School of Information and Control Engineering, Xi’an University of Architecture and Technology, Xi’an, ChinaSchool of Management, Xi’an University of Architecture and Technology, Xi’an, ChinaDepartment of Mathematics, Changzhi University, Changzhi, ChinaSchool of Information and Control Engineering, Xi’an University of Architecture and Technology, Xi’an, ChinaSchool of Management, Xi’an University of Architecture and Technology, Xi’an, ChinaSchool of Mathematical Sciences, Peking University, Beijing, ChinaRecently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message authentication code (MAC) scheme for the random linear network coding (RLNC) to resist tag pollution attacks (TPAs), and also presented the security analysis. As Esfahani et al. said, their scheme is based on the null space properties of Kehdi and Li, and the main contribution lies in adding the process of swapping when generating the tags for data packets. However, in this paper, we first point out that Esfahani et al.'s swapping technique is not essential for the TPA security, because the underlying non-swapping homomorphic MAC scheme has been secure against TPA and the process of swapping only improves the TPA security with a non-negligible factor. More importantly, we find that the security proof of Esfahani et al. is incorrect and misguided. In particular, according to Esfahani et al. suggestion, one should enlarge the number of neighbor nodes to reduce the probability of the TPA. However, this paper gives contrary suggestions in Esfahani et al.'s work by presenting the precise proof for the proposed homomorphic MAC scheme.https://ieeexplore.ieee.org/document/8753646/Homomorphic MACnetwork codingtag pollution attack (TPA)
spellingShingle Jinyong Chang
Bilin Shao
Anling Zhang
Genqing Bian
Yanyan Ji
Maozhi Xu
Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC
IEEE Access
Homomorphic MAC
network coding
tag pollution attack (TPA)
title Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC
title_full Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC
title_fullStr Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC
title_full_unstemmed Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC
title_short Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC
title_sort security analysis of an efficient null space based homomorphic mac scheme against tag pollution attacks in rlnc
topic Homomorphic MAC
network coding
tag pollution attack (TPA)
url https://ieeexplore.ieee.org/document/8753646/
work_keys_str_mv AT jinyongchang securityanalysisofanefficientnullspacebasedhomomorphicmacschemeagainsttagpollutionattacksinrlnc
AT bilinshao securityanalysisofanefficientnullspacebasedhomomorphicmacschemeagainsttagpollutionattacksinrlnc
AT anlingzhang securityanalysisofanefficientnullspacebasedhomomorphicmacschemeagainsttagpollutionattacksinrlnc
AT genqingbian securityanalysisofanefficientnullspacebasedhomomorphicmacschemeagainsttagpollutionattacksinrlnc
AT yanyanji securityanalysisofanefficientnullspacebasedhomomorphicmacschemeagainsttagpollutionattacksinrlnc
AT maozhixu securityanalysisofanefficientnullspacebasedhomomorphicmacschemeagainsttagpollutionattacksinrlnc